Abstract

Cloud computing is becoming an essential part of computing, especially for enterprises. As the need for cloud computing increases, the need for cloud data privacy, con-fidentially, and integrity are also becoming essential. Among potential solutions, homomorphic encryption can provide the needed privacy and confidentiality. Unlike traditional cryptosys-tem, homomorphic encryption allows computation delegation to the cloud provider while the data is in its encrypted form. Unfortunately, the solution is still lacking in data integrity. While on the cloud, there is a possibility that valid homomorphically encrypted data beings swapped with other valid homomorphically encrypted data. This paper proposes a verification scheme based on the modular residue to validate homomorphic encryption computation over integer finite field to be used in cloud computing so that data confidentiality, privacy, and data integrity can be en-forced during an outsourced computation. The performance of the proposed scheme varied based on the underlying cryptosystems used. However, based on the tested cryptosystems, the scheme has 1.5% storage overhead and a computational overhead that can be configured to work below 1%. Such overhead is an acceptable trade-off for verifying cloud computation which is highly needed in cloud computing.

Highlights

  • The demanding needs of modern computing have prompted many enterprises to outsource their data solution to cloud service providers (CSP)

  • This paper addresses the problem of data integrity verification (DIV) of CSP computations over homomorphically encrypted data

  • This paper addresses the problem of DIV of outsource computation

Read more

Summary

INTRODUCTION

The demanding needs of modern computing have prompted many enterprises to outsource their data solution to cloud service providers (CSP). The issue lies in the principle of cloud computing, where enterprises need to delegate the task of protecting their data to CSP [4]. Data sovereignty is lost once the data is stored in a remote CSP This absence of control for data security presents data protection problems. In order to ensure privacy and confidentiality in cloud computing, researchers have indicated that homomorphic encryption (HE) is one of the promising methods for remote manipulations over encrypted data [12], [13]. This paper addresses the problem of data integrity verification (DIV) of CSP computations over homomorphically encrypted data.

RELATED WORK
VERIFICATION SCHEME DESIGN
Scheme Preliminaries
Proposed Scheme
AND DISCUSSION
Storage Analysis
Performance Analysis
Security Analysis
Discussion
Findings
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call